Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2024 17:36
Static task
static1
Behavioral task
behavioral1
Sample
a016330561a142a8ce20e64509829780efa12d8f6c5065ef0b94f8230dcdb193.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a016330561a142a8ce20e64509829780efa12d8f6c5065ef0b94f8230dcdb193.exe
Resource
win10v2004-20241007-en
General
-
Target
a016330561a142a8ce20e64509829780efa12d8f6c5065ef0b94f8230dcdb193.exe
-
Size
128KB
-
MD5
bbf4f8ffd587d630c246d069291d100f
-
SHA1
7070e980d81fbd6c6a42b93b3694d2806a81eec4
-
SHA256
a016330561a142a8ce20e64509829780efa12d8f6c5065ef0b94f8230dcdb193
-
SHA512
7832ed88b5345fb975aa9c6eee818e49801485190fd3e6bbc8c0587242f1038cd6899c755c5d52ac3e8e70372b1373c7461afedea8ffe171d7061e884e0a24a1
-
SSDEEP
3072:TwBLaXuhMLmQGaw8asCHNhMXi6Y0HYSx9m9jqLsFmp:TwweqKQGa2xUS6UJjws6
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://master-x.com/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://crutop.ru/index.php
http://kaspersky.ru/index.php
http://color-bank.ru/index.php
http://adult-empire.com/index.php
http://virus-list.com/index.php
http://trojan.ru/index.php
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://fethard.biz/index.htm
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://kaspersky.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 64 IoCs
Processes:
Gmegkbfl.exeIdnljkpl.exeOldogm32.exeFkdoidbe.exeDmjecl32.exeGkioni32.exeHlbagd32.exeHkhjpkla.exeQllnnini.exeEenfcg32.exeGfibihab.exeCphgkfne.exeGffjla32.exeKebhabjh.exeBonoge32.exeGnbjhkpp.exeBcmohj32.exeDlkiii32.exeIlcjna32.exeJdfakm32.exeLjjikqkf.exeOhjbgaap.exeBnjibc32.exeImkimodd.exeDpihin32.exeInlgbl32.exeJhpgqboa.exeJgedao32.exeKlapcaak.exeGhoecg32.exeIcjeel32.exeOofgikfj.exeBodegp32.exePlpghd32.exeIpliiq32.exeMgiipc32.exeAdoaig32.exeEqpfbb32.exeJkndmnne.exeMbkkmcgj.exeFiqhde32.exeHpdlnk32.exePcopjdlm.exeGmanpc32.exeJfbbomci.exeHbqldg32.exeNpdgjo32.exeAoelaflg.exeMflgcg32.exeJbhlih32.exeBmbfkpfb.exeGbnmbpld.exeBogigfje.exeJemdbqkg.exePjcgddbk.exeHglpoi32.exeKglamd32.exeEppojm32.exeHmfglfle.exeHgkidbjf.exeNhoieioi.exeFjakin32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gmegkbfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Idnljkpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Oldogm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fkdoidbe.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dmjecl32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gkioni32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hlbagd32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hkhjpkla.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Qllnnini.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eenfcg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gfibihab.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Cphgkfne.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gffjla32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Kebhabjh.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bonoge32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gnbjhkpp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bcmohj32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Dlkiii32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ilcjna32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jdfakm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Ljjikqkf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ohjbgaap.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bnjibc32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Imkimodd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Dpihin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Inlgbl32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jhpgqboa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jgedao32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Klapcaak.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ghoecg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Icjeel32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Oofgikfj.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Bodegp32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Plpghd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Ipliiq32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mgiipc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Adoaig32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Eqpfbb32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jkndmnne.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Mbkkmcgj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Fiqhde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hpdlnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Pcopjdlm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Gmanpc32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jfbbomci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hbqldg32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Npdgjo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Aoelaflg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Mflgcg32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jbhlih32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bmbfkpfb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Gbnmbpld.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Bogigfje.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Jemdbqkg.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Pjcgddbk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Hglpoi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Kglamd32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Eppojm32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hmfglfle.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Hgkidbjf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Nhoieioi.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad Fjakin32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FEACFF-FFCE-815E-A900-316290B5B738}" Jdfakm32.exe -
Berbew family
-
Executes dropped EXE 64 IoCs
Processes:
Fgfmmlpj.exeFoneni32.exeFhfjgogm.exeFopbdi32.exeFdmjlp32.exeFkgbijdn.exeFaqkedkk.exeGhkcbn32.exeGkioni32.exeGnglje32.exeGeoclb32.exeGhmphn32.exeGgppcjgp.exeGeapabpo.exeGkniiinf.exeGdfmbn32.exeGolapg32.exeGffjla32.exeGggfdiag.exeGnanqc32.exeHfhfba32.exeHhfbnl32.exeHkeojh32.exeHfjcgq32.exeHglpoi32.exeHocgpf32.exeHfmpmpea.exeHgnldh32.exeHbcqba32.exeHfombpco.exeHklekg32.exeHnjagb32.exeHknapf32.exeIfdfno32.exeIgebegeg.exeIbjgbp32.exeIdicol32.exeIggokg32.exeInaggaka.exeIfhoiokd.exeIiglejjg.exeIbopnpah.exeIdnljkpl.exeIglhffop.exeIocqgdpb.exeIbamcooe.exeIilepi32.exeIkjale32.exeInhnhp32.exeJgqbaf32.exeJnkjnpbg.exeJfbbomci.exeJipnkibm.exeJojghc32.exeJbhcdnim.exeJegopjha.exeJkagmd32.exeJbkpingk.exeJghhaeeb.exeJkcdbc32.exeJbmloneh.exeJgjegd32.exeKfkeelko.exeKglamd32.exepid process 4508 Fgfmmlpj.exe 2156 Foneni32.exe 5112 Fhfjgogm.exe 3688 Fopbdi32.exe 4672 Fdmjlp32.exe 4400 Fkgbijdn.exe 4180 Faqkedkk.exe 4008 Ghkcbn32.exe 4448 Gkioni32.exe 2092 Gnglje32.exe 2984 Geoclb32.exe 620 Ghmphn32.exe 2760 Ggppcjgp.exe 3784 Geapabpo.exe 1316 Gkniiinf.exe 1808 Gdfmbn32.exe 3960 Golapg32.exe 1512 Gffjla32.exe 3860 Gggfdiag.exe 1312 Gnanqc32.exe 5072 Hfhfba32.exe 2456 Hhfbnl32.exe 2608 Hkeojh32.exe 3748 Hfjcgq32.exe 2768 Hglpoi32.exe 4856 Hocgpf32.exe 2264 Hfmpmpea.exe 2220 Hgnldh32.exe 3004 Hbcqba32.exe 5116 Hfombpco.exe 2900 Hklekg32.exe 4728 Hnjagb32.exe 2312 Hknapf32.exe 1716 Ifdfno32.exe 3988 Igebegeg.exe 3660 Ibjgbp32.exe 3048 Idicol32.exe 4488 Iggokg32.exe 2348 Inaggaka.exe 2188 Ifhoiokd.exe 3692 Iiglejjg.exe 3648 Ibopnpah.exe 1360 Idnljkpl.exe 2144 Iglhffop.exe 2424 Iocqgdpb.exe 1776 Ibamcooe.exe 4432 Iilepi32.exe 2116 Ikjale32.exe 3112 Inhnhp32.exe 5024 Jgqbaf32.exe 1632 Jnkjnpbg.exe 1540 Jfbbomci.exe 1700 Jipnkibm.exe 432 Jojghc32.exe 3204 Jbhcdnim.exe 4732 Jegopjha.exe 4436 Jkagmd32.exe 1916 Jbkpingk.exe 2640 Jghhaeeb.exe 1844 Jkcdbc32.exe 2104 Jbmloneh.exe 2780 Jgjegd32.exe 2884 Kfkeelko.exe 1896 Kglamd32.exe -
Drops file in System32 directory 64 IoCs
Processes:
Nmmqocdf.exeLiicno32.exeLnflff32.exeFmadji32.exeKneldaab.exeCdbnqk32.exeGmanpc32.exeNngdmfoo.exeCaqndjkp.exeFplnfk32.exeJdkaqcpp.exeNegcjm32.exeKgmica32.exeGdnimc32.exeHmfglfle.exeOhehla32.exeJgcgmb32.exeEdinel32.exeMjaokp32.exeCfmqoogd.exeAohekb32.exeIhknec32.exePeloac32.exeMjnkkj32.exeJkijao32.exeLibmmpol.exeJlgcia32.exeEfgcga32.exeIkamfi32.exeLmhnlffo.exeBpodegfp.exeIhhapc32.exeDcaajg32.exeEmoonlnb.exeCopebono.exeNjkile32.exeIjigme32.exeKnkcdn32.exeEdqdfk32.exeNijldmja.exeBkpfagnf.exeCldlfiad.exeChpffi32.exeLoodhbkj.exeCfgajjfa.exeHnpgfm32.exeHkhjpkla.exeFlddffdg.exeGeqlpdcg.exeIpieikcg.exeInhnhp32.exeNpkall32.exeFmbkeoai.exeCdmmkemf.exeFakkpnld.exeIkdafofp.exeEbfgqm32.exeJnjccjok.exeMlflkhkg.exeAhinicji.exeCinpkpha.exeLemqbjlo.exeOgomoend.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Ncgikm32.exe Nmmqocdf.exe File opened for modification C:\Windows\SysWOW64\Llhpjj32.exe Liicno32.exe File created C:\Windows\SysWOW64\Ljipmm32.dll Lnflff32.exe File created C:\Windows\SysWOW64\Flddffdg.exe Fmadji32.exe File created C:\Windows\SysWOW64\Kdodal32.exe Kneldaab.exe File created C:\Windows\SysWOW64\Clieah32.exe Cdbnqk32.exe File created C:\Windows\SysWOW64\Gnbjhkpp.exe Gmanpc32.exe File opened for modification C:\Windows\SysWOW64\Nafpib32.exe Nngdmfoo.exe File opened for modification C:\Windows\SysWOW64\Cdojqejc.exe Caqndjkp.exe File created C:\Windows\SysWOW64\Fhcfgi32.exe Fplnfk32.exe File opened for modification C:\Windows\SysWOW64\Kginmnod.exe Jdkaqcpp.exe File created C:\Windows\SysWOW64\Nopgcbpn.exe Negcjm32.exe File created C:\Windows\SysWOW64\Kljbkh32.exe Kgmica32.exe File created C:\Windows\SysWOW64\Lkjnfqph.dll Gdnimc32.exe File opened for modification C:\Windows\SysWOW64\Hdqoip32.exe Hmfglfle.exe File opened for modification C:\Windows\SysWOW64\Ojcehm32.exe Ohehla32.exe File opened for modification C:\Windows\SysWOW64\Jnmoilco.exe Jgcgmb32.exe File created C:\Windows\SysWOW64\Efhjag32.exe Edinel32.exe File opened for modification C:\Windows\SysWOW64\Mmokgk32.exe Mjaokp32.exe File created C:\Windows\SysWOW64\Ifaqoieh.dll Cfmqoogd.exe File created C:\Windows\SysWOW64\Aagbgm32.exe Aohekb32.exe File created C:\Windows\SysWOW64\Ilihoc32.dll Ihknec32.exe File created C:\Windows\SysWOW64\Ohlige32.dll Peloac32.exe File created C:\Windows\SysWOW64\Opoihjhe.dll Mjnkkj32.exe File opened for modification C:\Windows\SysWOW64\Jjlkmkie.exe Jkijao32.exe File created C:\Windows\SysWOW64\Onjnnink.dll Libmmpol.exe File created C:\Windows\SysWOW64\Jdokjngb.exe Jlgcia32.exe File created C:\Windows\SysWOW64\Eiepcm32.exe Efgcga32.exe File created C:\Windows\SysWOW64\Qbcmhd32.dll Ikamfi32.exe File created C:\Windows\SysWOW64\Mofjiaeb.exe Lmhnlffo.exe File created C:\Windows\SysWOW64\Ibpobk32.dll Aohekb32.exe File opened for modification C:\Windows\SysWOW64\Bdjqef32.exe Bpodegfp.exe File created C:\Windows\SysWOW64\Iqdfdf32.exe Ihhapc32.exe File created C:\Windows\SysWOW64\Djliga32.exe Dcaajg32.exe File opened for modification C:\Windows\SysWOW64\Ecigkf32.exe Emoonlnb.exe File opened for modification C:\Windows\SysWOW64\Cnbenk32.exe Copebono.exe File created C:\Windows\SysWOW64\Naeaio32.exe Njkile32.exe File created C:\Windows\SysWOW64\Lnenikaf.dll Ijigme32.exe File created C:\Windows\SysWOW64\Kfbkfk32.exe Knkcdn32.exe File created C:\Windows\SysWOW64\Ehlpfjkl.exe Edqdfk32.exe File opened for modification C:\Windows\SysWOW64\Nlhhqhie.exe Nijldmja.exe File created C:\Windows\SysWOW64\Bajnna32.exe Bkpfagnf.exe File created C:\Windows\SysWOW64\Cochbdpg.exe Cldlfiad.exe File created C:\Windows\SysWOW64\Cknbbe32.exe Chpffi32.exe File created C:\Windows\SysWOW64\Lgflip32.exe Loodhbkj.exe File created C:\Windows\SysWOW64\Cmaigd32.exe Cfgajjfa.exe File created C:\Windows\SysWOW64\Aleemhii.dll Hnpgfm32.exe File created C:\Windows\SysWOW64\Epeekpkf.dll Hkhjpkla.exe File created C:\Windows\SysWOW64\Cifihg32.dll Flddffdg.exe File created C:\Windows\SysWOW64\Jnfogi32.dll Geqlpdcg.exe File created C:\Windows\SysWOW64\Igcnfdjd.exe Ipieikcg.exe File created C:\Windows\SysWOW64\Hjnahe32.dll Inhnhp32.exe File opened for modification C:\Windows\SysWOW64\Ngejiffo.exe Npkall32.exe File opened for modification C:\Windows\SysWOW64\Fpqgakql.exe Fmbkeoai.exe File created C:\Windows\SysWOW64\Ahglbbcn.dll Cdmmkemf.exe File opened for modification C:\Windows\SysWOW64\Fdjgljkh.exe Fakkpnld.exe File created C:\Windows\SysWOW64\Incmbkec.exe Ikdafofp.exe File created C:\Windows\SysWOW64\Eggneoaa.dll Ebfgqm32.exe File opened for modification C:\Windows\SysWOW64\Jqhpoeno.exe Jnjccjok.exe File opened for modification C:\Windows\SysWOW64\Mbpdhb32.exe Mlflkhkg.exe File created C:\Windows\SysWOW64\Aldjja32.exe Ahinicji.exe File created C:\Windows\SysWOW64\Dljpdi32.dll Cinpkpha.exe File opened for modification C:\Windows\SysWOW64\Lgkmoelc.exe Lemqbjlo.exe File created C:\Windows\SysWOW64\Lqklnehl.dll Ogomoend.exe -
Program crash 1 IoCs
Processes:
pid pid_target process target process 4568 6384 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Oejpplhk.exeFjakin32.exeKnioekia.exeEpphpgkc.exeKqhalm32.exeAcafga32.exeMhefojgd.exeOioofi32.exeAefhbh32.exeEcfjefgb.exeMqfnmjpq.exePhcempie.exeBjdjodgo.exeNjhelo32.exeNnhkhm32.exeIlkmcl32.exeKebolhnd.exeGineepcg.exeNeniig32.exeBkeplf32.exeGfibihab.exeBdegjfbn.exeLechbf32.exeCpipbpcj.exeDmdfmclk.exeCoeehd32.exeDebfginj.exeJglqlc32.exeLfnfpl32.exeAofjfcco.exeIqdfdf32.exeLdfjbkbg.exeOcnollek.exeBmibhm32.exeQjnbbnoe.exeBqjpke32.exeIhfejdgl.exeKgmqmg32.exeOmgjohog.exeDilfbh32.exeAdlddh32.exeHfhfba32.exeMfbdmi32.exeKjhjijog.exeBpodegfp.exeNiaipbhe.exeJqmijd32.exeEiepcm32.exeIglhffop.exeHphfhgla.exeMeigiofm.exeEijinlpa.exeKjlmic32.exeMamdni32.exeNmfjndjo.exeCafogc32.exeGipbjo32.exeFlpkkfim.exeDbmdjn32.exeOcadif32.exeIjedll32.exeFmhadjfg.exeEklodc32.exeOjlqce32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oejpplhk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fjakin32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Knioekia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Epphpgkc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kqhalm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Acafga32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mhefojgd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oioofi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aefhbh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ecfjefgb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mqfnmjpq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Phcempie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjdjodgo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Njhelo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nnhkhm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ilkmcl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kebolhnd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gineepcg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Neniig32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bkeplf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gfibihab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bdegjfbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lechbf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cpipbpcj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dmdfmclk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Coeehd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Debfginj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jglqlc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Lfnfpl32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aofjfcco.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iqdfdf32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ldfjbkbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ocnollek.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bmibhm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qjnbbnoe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bqjpke32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ihfejdgl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kgmqmg32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Omgjohog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dilfbh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adlddh32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hfhfba32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mfbdmi32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kjhjijog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bpodegfp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Niaipbhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Jqmijd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eiepcm32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Iglhffop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Hphfhgla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Meigiofm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eijinlpa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Kjlmic32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mamdni32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nmfjndjo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cafogc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gipbjo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Flpkkfim.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dbmdjn32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ocadif32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ijedll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fmhadjfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Eklodc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ojlqce32.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
-
Modifies registry class 64 IoCs
Processes:
Jgjegd32.exeLijjhe32.exeEjpbbpoo.exeGjeedmmf.exeHbjlnnbg.exeKgmqmg32.exeAlafjl32.exeHnjagb32.exeAkflqbbe.exeBodegp32.exePjajoedm.exeNeefdm32.exeEcpmkepg.exeFgcjmfna.exeCknbbe32.exeIlbcckfi.exeQogpph32.exeNifbka32.exeBfieil32.exeCfgajjfa.exeKcdabhmg.exePabofdin.exeFfgecicd.exeOmhpjaji.exeIilepi32.exeLmobqnbe.exeFiqhde32.exeAdjgnhmk.exeEbmfgfcp.exeFdemajom.exeEdinel32.exeMipinnbl.exeKjqfdbca.exeFbdcbk32.exeBdegjfbn.exeMpmeknkb.exeQagiac32.exeIehkga32.exeOcnollek.exeAdenci32.exeAhhpdfcb.exeDnhgph32.exeKginmnod.exeNkpbgdlj.exeAonmknfk.exeCjicjc32.exeHlbagd32.exeNjhelo32.exePdgbbkmq.exeJnaidi32.exeHpdlnk32.exeOgjcde32.exeFegiif32.exeDpdhdheq.exeLnchfp32.exeMgpoondb.exeMckioo32.exeFjlbnoea.exeHkhjpkla.exeFbimmjmn.exeOogdngna.exeFkmihehm.exeBajnna32.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Jgjegd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Lijjhe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jqogmk32.dll" Ejpbbpoo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Gjeedmmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Nppgkpme.dll" Hbjlnnbg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kgmqmg32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Alafjl32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hnjagb32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Akflqbbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Famopi32.dll" Bodegp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pjajoedm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Neefdm32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbemogeo.dll" Ecpmkepg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Baockl32.dll" Fgcjmfna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cknbbe32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ilbcckfi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Qogpph32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Ebofca32.dll" Nifbka32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Iahbheek.dll" Bfieil32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Cfgajjfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bcjebmic.dll" Kcdabhmg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Pabofdin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ffgecicd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Jdjkgkeb.dll" Omhpjaji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iilepi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fibnjo32.dll" Lmobqnbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pihdnokh.dll" Fiqhde32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Adjgnhmk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Ebmfgfcp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fdemajom.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Edinel32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mipinnbl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kjqfdbca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Fbdcbk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kfbiahje.dll" Bdegjfbn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mpmeknkb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dlgdhm32.dll" Qagiac32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kifgdj32.dll" Fbdcbk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Iehkga32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Ocnollek.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Adenci32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fjamcc32.dll" Ahhpdfcb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dnhgph32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Kginmnod.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Nkpbgdlj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Fefemn32.dll" Aonmknfk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Dohcfn32.dll" Cjicjc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Hlbagd32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Njhelo32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Bhfpjema.dll" Pdgbbkmq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Jnaidi32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hpdlnk32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Kjjfim32.dll" Ogjcde32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Loqnjgip.dll" Fegiif32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Dpdhdheq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Lnchfp32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Mgpoondb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Mckioo32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fjlbnoea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Hkhjpkla.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ = "C:\\Windows\\SysWow64\\Mbdkbo32.dll" Fbimmjmn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Oogdngna.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32 Fkmihehm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{79FEACFF-FFCE-815E-A900-316290B5B738}\InProcServer32\ThreadingModel = "Apartment" Bajnna32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a016330561a142a8ce20e64509829780efa12d8f6c5065ef0b94f8230dcdb193.exeFgfmmlpj.exeFoneni32.exeFhfjgogm.exeFopbdi32.exeFdmjlp32.exeFkgbijdn.exeFaqkedkk.exeGhkcbn32.exeGkioni32.exeGnglje32.exeGeoclb32.exeGhmphn32.exeGgppcjgp.exeGeapabpo.exeGkniiinf.exeGdfmbn32.exeGolapg32.exeGffjla32.exeGggfdiag.exeGnanqc32.exeHfhfba32.exedescription pid process target process PID 876 wrote to memory of 4508 876 a016330561a142a8ce20e64509829780efa12d8f6c5065ef0b94f8230dcdb193.exe Fgfmmlpj.exe PID 876 wrote to memory of 4508 876 a016330561a142a8ce20e64509829780efa12d8f6c5065ef0b94f8230dcdb193.exe Fgfmmlpj.exe PID 876 wrote to memory of 4508 876 a016330561a142a8ce20e64509829780efa12d8f6c5065ef0b94f8230dcdb193.exe Fgfmmlpj.exe PID 4508 wrote to memory of 2156 4508 Fgfmmlpj.exe Foneni32.exe PID 4508 wrote to memory of 2156 4508 Fgfmmlpj.exe Foneni32.exe PID 4508 wrote to memory of 2156 4508 Fgfmmlpj.exe Foneni32.exe PID 2156 wrote to memory of 5112 2156 Foneni32.exe Fhfjgogm.exe PID 2156 wrote to memory of 5112 2156 Foneni32.exe Fhfjgogm.exe PID 2156 wrote to memory of 5112 2156 Foneni32.exe Fhfjgogm.exe PID 5112 wrote to memory of 3688 5112 Fhfjgogm.exe Fopbdi32.exe PID 5112 wrote to memory of 3688 5112 Fhfjgogm.exe Fopbdi32.exe PID 5112 wrote to memory of 3688 5112 Fhfjgogm.exe Fopbdi32.exe PID 3688 wrote to memory of 4672 3688 Fopbdi32.exe Fdmjlp32.exe PID 3688 wrote to memory of 4672 3688 Fopbdi32.exe Fdmjlp32.exe PID 3688 wrote to memory of 4672 3688 Fopbdi32.exe Fdmjlp32.exe PID 4672 wrote to memory of 4400 4672 Fdmjlp32.exe Fkgbijdn.exe PID 4672 wrote to memory of 4400 4672 Fdmjlp32.exe Fkgbijdn.exe PID 4672 wrote to memory of 4400 4672 Fdmjlp32.exe Fkgbijdn.exe PID 4400 wrote to memory of 4180 4400 Fkgbijdn.exe Faqkedkk.exe PID 4400 wrote to memory of 4180 4400 Fkgbijdn.exe Faqkedkk.exe PID 4400 wrote to memory of 4180 4400 Fkgbijdn.exe Faqkedkk.exe PID 4180 wrote to memory of 4008 4180 Faqkedkk.exe Ghkcbn32.exe PID 4180 wrote to memory of 4008 4180 Faqkedkk.exe Ghkcbn32.exe PID 4180 wrote to memory of 4008 4180 Faqkedkk.exe Ghkcbn32.exe PID 4008 wrote to memory of 4448 4008 Ghkcbn32.exe Gkioni32.exe PID 4008 wrote to memory of 4448 4008 Ghkcbn32.exe Gkioni32.exe PID 4008 wrote to memory of 4448 4008 Ghkcbn32.exe Gkioni32.exe PID 4448 wrote to memory of 2092 4448 Gkioni32.exe Gnglje32.exe PID 4448 wrote to memory of 2092 4448 Gkioni32.exe Gnglje32.exe PID 4448 wrote to memory of 2092 4448 Gkioni32.exe Gnglje32.exe PID 2092 wrote to memory of 2984 2092 Gnglje32.exe Geoclb32.exe PID 2092 wrote to memory of 2984 2092 Gnglje32.exe Geoclb32.exe PID 2092 wrote to memory of 2984 2092 Gnglje32.exe Geoclb32.exe PID 2984 wrote to memory of 620 2984 Geoclb32.exe Ghmphn32.exe PID 2984 wrote to memory of 620 2984 Geoclb32.exe Ghmphn32.exe PID 2984 wrote to memory of 620 2984 Geoclb32.exe Ghmphn32.exe PID 620 wrote to memory of 2760 620 Ghmphn32.exe Ggppcjgp.exe PID 620 wrote to memory of 2760 620 Ghmphn32.exe Ggppcjgp.exe PID 620 wrote to memory of 2760 620 Ghmphn32.exe Ggppcjgp.exe PID 2760 wrote to memory of 3784 2760 Ggppcjgp.exe Geapabpo.exe PID 2760 wrote to memory of 3784 2760 Ggppcjgp.exe Geapabpo.exe PID 2760 wrote to memory of 3784 2760 Ggppcjgp.exe Geapabpo.exe PID 3784 wrote to memory of 1316 3784 Geapabpo.exe Gkniiinf.exe PID 3784 wrote to memory of 1316 3784 Geapabpo.exe Gkniiinf.exe PID 3784 wrote to memory of 1316 3784 Geapabpo.exe Gkniiinf.exe PID 1316 wrote to memory of 1808 1316 Gkniiinf.exe Gdfmbn32.exe PID 1316 wrote to memory of 1808 1316 Gkniiinf.exe Gdfmbn32.exe PID 1316 wrote to memory of 1808 1316 Gkniiinf.exe Gdfmbn32.exe PID 1808 wrote to memory of 3960 1808 Gdfmbn32.exe Golapg32.exe PID 1808 wrote to memory of 3960 1808 Gdfmbn32.exe Golapg32.exe PID 1808 wrote to memory of 3960 1808 Gdfmbn32.exe Golapg32.exe PID 3960 wrote to memory of 1512 3960 Golapg32.exe Gffjla32.exe PID 3960 wrote to memory of 1512 3960 Golapg32.exe Gffjla32.exe PID 3960 wrote to memory of 1512 3960 Golapg32.exe Gffjla32.exe PID 1512 wrote to memory of 3860 1512 Gffjla32.exe Gggfdiag.exe PID 1512 wrote to memory of 3860 1512 Gffjla32.exe Gggfdiag.exe PID 1512 wrote to memory of 3860 1512 Gffjla32.exe Gggfdiag.exe PID 3860 wrote to memory of 1312 3860 Gggfdiag.exe Gnanqc32.exe PID 3860 wrote to memory of 1312 3860 Gggfdiag.exe Gnanqc32.exe PID 3860 wrote to memory of 1312 3860 Gggfdiag.exe Gnanqc32.exe PID 1312 wrote to memory of 5072 1312 Gnanqc32.exe Hfhfba32.exe PID 1312 wrote to memory of 5072 1312 Gnanqc32.exe Hfhfba32.exe PID 1312 wrote to memory of 5072 1312 Gnanqc32.exe Hfhfba32.exe PID 5072 wrote to memory of 2456 5072 Hfhfba32.exe Hhfbnl32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a016330561a142a8ce20e64509829780efa12d8f6c5065ef0b94f8230dcdb193.exe"C:\Users\Admin\AppData\Local\Temp\a016330561a142a8ce20e64509829780efa12d8f6c5065ef0b94f8230dcdb193.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\Fgfmmlpj.exeC:\Windows\system32\Fgfmmlpj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\Foneni32.exeC:\Windows\system32\Foneni32.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\Fhfjgogm.exeC:\Windows\system32\Fhfjgogm.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\Fopbdi32.exeC:\Windows\system32\Fopbdi32.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\Fdmjlp32.exeC:\Windows\system32\Fdmjlp32.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\Fkgbijdn.exeC:\Windows\system32\Fkgbijdn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\Faqkedkk.exeC:\Windows\system32\Faqkedkk.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Windows\SysWOW64\Ghkcbn32.exeC:\Windows\system32\Ghkcbn32.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\Gkioni32.exeC:\Windows\system32\Gkioni32.exe10⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\Gnglje32.exeC:\Windows\system32\Gnglje32.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\Geoclb32.exeC:\Windows\system32\Geoclb32.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\Ghmphn32.exeC:\Windows\system32\Ghmphn32.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\Ggppcjgp.exeC:\Windows\system32\Ggppcjgp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\Geapabpo.exeC:\Windows\system32\Geapabpo.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\Gkniiinf.exeC:\Windows\system32\Gkniiinf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\Gdfmbn32.exeC:\Windows\system32\Gdfmbn32.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\Golapg32.exeC:\Windows\system32\Golapg32.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\Gffjla32.exeC:\Windows\system32\Gffjla32.exe19⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\Gggfdiag.exeC:\Windows\system32\Gggfdiag.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\SysWOW64\Gnanqc32.exeC:\Windows\system32\Gnanqc32.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\Hfhfba32.exeC:\Windows\system32\Hfhfba32.exe22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\Hhfbnl32.exeC:\Windows\system32\Hhfbnl32.exe23⤵
- Executes dropped EXE
PID:2456 -
C:\Windows\SysWOW64\Hkeojh32.exeC:\Windows\system32\Hkeojh32.exe24⤵
- Executes dropped EXE
PID:2608 -
C:\Windows\SysWOW64\Hfjcgq32.exeC:\Windows\system32\Hfjcgq32.exe25⤵
- Executes dropped EXE
PID:3748 -
C:\Windows\SysWOW64\Hglpoi32.exeC:\Windows\system32\Hglpoi32.exe26⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:2768 -
C:\Windows\SysWOW64\Hocgpf32.exeC:\Windows\system32\Hocgpf32.exe27⤵
- Executes dropped EXE
PID:4856 -
C:\Windows\SysWOW64\Hfmpmpea.exeC:\Windows\system32\Hfmpmpea.exe28⤵
- Executes dropped EXE
PID:2264 -
C:\Windows\SysWOW64\Hgnldh32.exeC:\Windows\system32\Hgnldh32.exe29⤵
- Executes dropped EXE
PID:2220 -
C:\Windows\SysWOW64\Hbcqba32.exeC:\Windows\system32\Hbcqba32.exe30⤵
- Executes dropped EXE
PID:3004 -
C:\Windows\SysWOW64\Hfombpco.exeC:\Windows\system32\Hfombpco.exe31⤵
- Executes dropped EXE
PID:5116 -
C:\Windows\SysWOW64\Hklekg32.exeC:\Windows\system32\Hklekg32.exe32⤵
- Executes dropped EXE
PID:2900 -
C:\Windows\SysWOW64\Hnjagb32.exeC:\Windows\system32\Hnjagb32.exe33⤵
- Executes dropped EXE
- Modifies registry class
PID:4728 -
C:\Windows\SysWOW64\Hddiclhf.exeC:\Windows\system32\Hddiclhf.exe34⤵PID:1108
-
C:\Windows\SysWOW64\Hknapf32.exeC:\Windows\system32\Hknapf32.exe35⤵
- Executes dropped EXE
PID:2312 -
C:\Windows\SysWOW64\Ifdfno32.exeC:\Windows\system32\Ifdfno32.exe36⤵
- Executes dropped EXE
PID:1716 -
C:\Windows\SysWOW64\Igebegeg.exeC:\Windows\system32\Igebegeg.exe37⤵
- Executes dropped EXE
PID:3988 -
C:\Windows\SysWOW64\Ibjgbp32.exeC:\Windows\system32\Ibjgbp32.exe38⤵
- Executes dropped EXE
PID:3660 -
C:\Windows\SysWOW64\Idicol32.exeC:\Windows\system32\Idicol32.exe39⤵
- Executes dropped EXE
PID:3048 -
C:\Windows\SysWOW64\Iggokg32.exeC:\Windows\system32\Iggokg32.exe40⤵
- Executes dropped EXE
PID:4488 -
C:\Windows\SysWOW64\Inaggaka.exeC:\Windows\system32\Inaggaka.exe41⤵
- Executes dropped EXE
PID:2348 -
C:\Windows\SysWOW64\Ifhoiokd.exeC:\Windows\system32\Ifhoiokd.exe42⤵
- Executes dropped EXE
PID:2188 -
C:\Windows\SysWOW64\Iiglejjg.exeC:\Windows\system32\Iiglejjg.exe43⤵
- Executes dropped EXE
PID:3692 -
C:\Windows\SysWOW64\Ibopnpah.exeC:\Windows\system32\Ibopnpah.exe44⤵
- Executes dropped EXE
PID:3648 -
C:\Windows\SysWOW64\Idnljkpl.exeC:\Windows\system32\Idnljkpl.exe45⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1360 -
C:\Windows\SysWOW64\Iglhffop.exeC:\Windows\system32\Iglhffop.exe46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2144 -
C:\Windows\SysWOW64\Iocqgdpb.exeC:\Windows\system32\Iocqgdpb.exe47⤵
- Executes dropped EXE
PID:2424 -
C:\Windows\SysWOW64\Ibamcooe.exeC:\Windows\system32\Ibamcooe.exe48⤵
- Executes dropped EXE
PID:1776 -
C:\Windows\SysWOW64\Iilepi32.exeC:\Windows\system32\Iilepi32.exe49⤵
- Executes dropped EXE
- Modifies registry class
PID:4432 -
C:\Windows\SysWOW64\Ikjale32.exeC:\Windows\system32\Ikjale32.exe50⤵
- Executes dropped EXE
PID:2116 -
C:\Windows\SysWOW64\Inhnhp32.exeC:\Windows\system32\Inhnhp32.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3112 -
C:\Windows\SysWOW64\Jgqbaf32.exeC:\Windows\system32\Jgqbaf32.exe52⤵
- Executes dropped EXE
PID:5024 -
C:\Windows\SysWOW64\Jnkjnpbg.exeC:\Windows\system32\Jnkjnpbg.exe53⤵
- Executes dropped EXE
PID:1632 -
C:\Windows\SysWOW64\Jfbbomci.exeC:\Windows\system32\Jfbbomci.exe54⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1540 -
C:\Windows\SysWOW64\Jipnkibm.exeC:\Windows\system32\Jipnkibm.exe55⤵
- Executes dropped EXE
PID:1700 -
C:\Windows\SysWOW64\Jojghc32.exeC:\Windows\system32\Jojghc32.exe56⤵
- Executes dropped EXE
PID:432 -
C:\Windows\SysWOW64\Jbhcdnim.exeC:\Windows\system32\Jbhcdnim.exe57⤵
- Executes dropped EXE
PID:3204 -
C:\Windows\SysWOW64\Jegopjha.exeC:\Windows\system32\Jegopjha.exe58⤵
- Executes dropped EXE
PID:4732 -
C:\Windows\SysWOW64\Jkagmd32.exeC:\Windows\system32\Jkagmd32.exe59⤵
- Executes dropped EXE
PID:4436 -
C:\Windows\SysWOW64\Jbkpingk.exeC:\Windows\system32\Jbkpingk.exe60⤵
- Executes dropped EXE
- System Network Configuration Discovery: Internet Connection Discovery
PID:1916 -
C:\Windows\SysWOW64\Jghhaeeb.exeC:\Windows\system32\Jghhaeeb.exe61⤵
- Executes dropped EXE
PID:2640 -
C:\Windows\SysWOW64\Jkcdbc32.exeC:\Windows\system32\Jkcdbc32.exe62⤵
- Executes dropped EXE
PID:1844 -
C:\Windows\SysWOW64\Jbmloneh.exeC:\Windows\system32\Jbmloneh.exe63⤵
- Executes dropped EXE
PID:2104 -
C:\Windows\SysWOW64\Jgjegd32.exeC:\Windows\system32\Jgjegd32.exe64⤵
- Executes dropped EXE
- Modifies registry class
PID:2780 -
C:\Windows\SysWOW64\Kfkeelko.exeC:\Windows\system32\Kfkeelko.exe65⤵
- Executes dropped EXE
PID:2884 -
C:\Windows\SysWOW64\Kglamd32.exeC:\Windows\system32\Kglamd32.exe66⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Executes dropped EXE
PID:1896 -
C:\Windows\SysWOW64\Knfjinhj.exeC:\Windows\system32\Knfjinhj.exe67⤵PID:1176
-
C:\Windows\SysWOW64\Kepbfh32.exeC:\Windows\system32\Kepbfh32.exe68⤵PID:3388
-
C:\Windows\SysWOW64\Khonbdoj.exeC:\Windows\system32\Khonbdoj.exe69⤵PID:4956
-
C:\Windows\SysWOW64\Knifon32.exeC:\Windows\system32\Knifon32.exe70⤵PID:1208
-
C:\Windows\SysWOW64\Kebolhnd.exeC:\Windows\system32\Kebolhnd.exe71⤵
- System Location Discovery: System Language Discovery
PID:2928 -
C:\Windows\SysWOW64\Khakhcmg.exeC:\Windows\system32\Khakhcmg.exe72⤵PID:2604
-
C:\Windows\SysWOW64\Knkcdn32.exeC:\Windows\system32\Knkcdn32.exe73⤵
- Drops file in System32 directory
PID:3712 -
C:\Windows\SysWOW64\Kfbkfk32.exeC:\Windows\system32\Kfbkfk32.exe74⤵PID:1940
-
C:\Windows\SysWOW64\Khchmc32.exeC:\Windows\system32\Khchmc32.exe75⤵PID:3304
-
C:\Windows\SysWOW64\Knmpjmba.exeC:\Windows\system32\Knmpjmba.exe76⤵PID:2008
-
C:\Windows\SysWOW64\Kfdhkkcd.exeC:\Windows\system32\Kfdhkkcd.exe77⤵PID:2836
-
C:\Windows\SysWOW64\Klapcaak.exeC:\Windows\system32\Klapcaak.exe78⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3976 -
C:\Windows\SysWOW64\Lfgdajaa.exeC:\Windows\system32\Lfgdajaa.exe79⤵PID:4916
-
C:\Windows\SysWOW64\Lhhahb32.exeC:\Windows\system32\Lhhahb32.exe80⤵PID:4524
-
C:\Windows\SysWOW64\Lnbiem32.exeC:\Windows\system32\Lnbiem32.exe81⤵PID:4560
-
C:\Windows\SysWOW64\Lpafopeo.exeC:\Windows\system32\Lpafopeo.exe82⤵PID:2832
-
C:\Windows\SysWOW64\Lijjhe32.exeC:\Windows\system32\Lijjhe32.exe83⤵
- Modifies registry class
PID:2888 -
C:\Windows\SysWOW64\Lpdbeo32.exeC:\Windows\system32\Lpdbeo32.exe84⤵PID:1256
-
C:\Windows\SysWOW64\Leqkmf32.exeC:\Windows\system32\Leqkmf32.exe85⤵PID:3108
-
C:\Windows\SysWOW64\Llkcjpiq.exeC:\Windows\system32\Llkcjpiq.exe86⤵PID:724
-
C:\Windows\SysWOW64\Lechbf32.exeC:\Windows\system32\Lechbf32.exe87⤵
- System Location Discovery: System Language Discovery
PID:64 -
C:\Windows\SysWOW64\Lhadoa32.exeC:\Windows\system32\Lhadoa32.exe88⤵PID:2792
-
C:\Windows\SysWOW64\Mpilpo32.exeC:\Windows\system32\Mpilpo32.exe89⤵PID:4644
-
C:\Windows\SysWOW64\Mfbdmi32.exeC:\Windows\system32\Mfbdmi32.exe90⤵
- System Location Discovery: System Language Discovery
PID:556 -
C:\Windows\SysWOW64\Miapid32.exeC:\Windows\system32\Miapid32.exe91⤵PID:1692
-
C:\Windows\SysWOW64\Mlomep32.exeC:\Windows\system32\Mlomep32.exe92⤵PID:2560
-
C:\Windows\SysWOW64\Moniak32.exeC:\Windows\system32\Moniak32.exe93⤵PID:2964
-
C:\Windows\SysWOW64\Mbieajlh.exeC:\Windows\system32\Mbieajlh.exe94⤵PID:4416
-
C:\Windows\SysWOW64\Micmnd32.exeC:\Windows\system32\Micmnd32.exe95⤵PID:5148
-
C:\Windows\SysWOW64\Mlaijo32.exeC:\Windows\system32\Mlaijo32.exe96⤵PID:5192
-
C:\Windows\SysWOW64\Mpmeknkb.exeC:\Windows\system32\Mpmeknkb.exe97⤵
- Modifies registry class
PID:5236 -
C:\Windows\SysWOW64\Mblagi32.exeC:\Windows\system32\Mblagi32.exe98⤵PID:5280
-
C:\Windows\SysWOW64\Mejnce32.exeC:\Windows\system32\Mejnce32.exe99⤵PID:5324
-
C:\Windows\SysWOW64\Mhhjop32.exeC:\Windows\system32\Mhhjop32.exe100⤵PID:5368
-
C:\Windows\SysWOW64\Mobbljpj.exeC:\Windows\system32\Mobbljpj.exe101⤵PID:5412
-
C:\Windows\SysWOW64\Mfjjmhql.exeC:\Windows\system32\Mfjjmhql.exe102⤵PID:5452
-
C:\Windows\SysWOW64\Mhkgep32.exeC:\Windows\system32\Mhkgep32.exe103⤵PID:5496
-
C:\Windows\SysWOW64\Mpbofm32.exeC:\Windows\system32\Mpbofm32.exe104⤵PID:5548
-
C:\Windows\SysWOW64\Mflgcg32.exeC:\Windows\system32\Mflgcg32.exe105⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5588 -
C:\Windows\SysWOW64\Mijcoc32.exeC:\Windows\system32\Mijcoc32.exe106⤵PID:5636
-
C:\Windows\SysWOW64\Nliokn32.exeC:\Windows\system32\Nliokn32.exe107⤵PID:5704
-
C:\Windows\SysWOW64\Nbchhhdm.exeC:\Windows\system32\Nbchhhdm.exe108⤵PID:5772
-
C:\Windows\SysWOW64\Nfnchg32.exeC:\Windows\system32\Nfnchg32.exe109⤵PID:5832
-
C:\Windows\SysWOW64\Nhpppobe.exeC:\Windows\system32\Nhpppobe.exe110⤵PID:5880
-
C:\Windows\SysWOW64\Noihmi32.exeC:\Windows\system32\Noihmi32.exe111⤵PID:5924
-
C:\Windows\SysWOW64\Necqicao.exeC:\Windows\system32\Necqicao.exe112⤵PID:5988
-
C:\Windows\SysWOW64\Niomjbjg.exeC:\Windows\system32\Niomjbjg.exe113⤵PID:6060
-
C:\Windows\SysWOW64\Nlmifnik.exeC:\Windows\system32\Nlmifnik.exe114⤵PID:6104
-
C:\Windows\SysWOW64\Npiegl32.exeC:\Windows\system32\Npiegl32.exe115⤵PID:5124
-
C:\Windows\SysWOW64\Nolebiho.exeC:\Windows\system32\Nolebiho.exe116⤵PID:5212
-
C:\Windows\SysWOW64\Ngcmcfha.exeC:\Windows\system32\Ngcmcfha.exe117⤵PID:5264
-
C:\Windows\SysWOW64\Niaipbhe.exeC:\Windows\system32\Niaipbhe.exe118⤵
- System Location Discovery: System Language Discovery
PID:5364 -
C:\Windows\SysWOW64\Npkall32.exeC:\Windows\system32\Npkall32.exe119⤵
- Drops file in System32 directory
PID:5436 -
C:\Windows\SysWOW64\Ngejiffo.exeC:\Windows\system32\Ngejiffo.exe120⤵PID:5508
-
C:\Windows\SysWOW64\Nehjdc32.exeC:\Windows\system32\Nehjdc32.exe121⤵PID:5600
-
C:\Windows\SysWOW64\Npnnblmo.exeC:\Windows\system32\Npnnblmo.exe122⤵PID:5696
-
C:\Windows\SysWOW64\Nghfof32.exeC:\Windows\system32\Nghfof32.exe123⤵PID:5828
-
C:\Windows\SysWOW64\Nifbka32.exeC:\Windows\system32\Nifbka32.exe124⤵
- Modifies registry class
PID:5888 -
C:\Windows\SysWOW64\Oldogm32.exeC:\Windows\system32\Oldogm32.exe125⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:5980 -
C:\Windows\SysWOW64\Oockch32.exeC:\Windows\system32\Oockch32.exe126⤵PID:6100
-
C:\Windows\SysWOW64\Ogjcde32.exeC:\Windows\system32\Ogjcde32.exe127⤵
- Modifies registry class
PID:5144 -
C:\Windows\SysWOW64\Oihopa32.exeC:\Windows\system32\Oihopa32.exe128⤵PID:5260
-
C:\Windows\SysWOW64\Olglllqq.exeC:\Windows\system32\Olglllqq.exe129⤵PID:5408
-
C:\Windows\SysWOW64\Opbhmk32.exeC:\Windows\system32\Opbhmk32.exe130⤵PID:5488
-
C:\Windows\SysWOW64\Ocadif32.exeC:\Windows\system32\Ocadif32.exe131⤵
- System Location Discovery: System Language Discovery
PID:5628 -
C:\Windows\SysWOW64\Oglpjeqf.exeC:\Windows\system32\Oglpjeqf.exe132⤵PID:5792
-
C:\Windows\SysWOW64\Oiklfqpj.exeC:\Windows\system32\Oiklfqpj.exe133⤵PID:5932
-
C:\Windows\SysWOW64\Olihblon.exeC:\Windows\system32\Olihblon.exe134⤵PID:6092
-
C:\Windows\SysWOW64\Oogdngna.exeC:\Windows\system32\Oogdngna.exe135⤵
- Modifies registry class
PID:5224 -
C:\Windows\SysWOW64\Ogomoend.exeC:\Windows\system32\Ogomoend.exe136⤵
- Drops file in System32 directory
PID:5448 -
C:\Windows\SysWOW64\Oimikpng.exeC:\Windows\system32\Oimikpng.exe137⤵PID:5672
-
C:\Windows\SysWOW64\Ohpigm32.exeC:\Windows\system32\Ohpigm32.exe138⤵PID:5892
-
C:\Windows\SysWOW64\Opgahjed.exeC:\Windows\system32\Opgahjed.exe139⤵PID:4360
-
C:\Windows\SysWOW64\Ogaied32.exeC:\Windows\system32\Ogaied32.exe140⤵PID:5420
-
C:\Windows\SysWOW64\Ojpeap32.exeC:\Windows\system32\Ojpeap32.exe141⤵PID:5872
-
C:\Windows\SysWOW64\Ohbflmbp.exeC:\Windows\system32\Ohbflmbp.exe142⤵PID:5132
-
C:\Windows\SysWOW64\Opinnjcb.exeC:\Windows\system32\Opinnjcb.exe143⤵PID:5676
-
C:\Windows\SysWOW64\Oolnig32.exeC:\Windows\system32\Oolnig32.exe144⤵PID:5724
-
C:\Windows\SysWOW64\Ogcfjd32.exeC:\Windows\system32\Ogcfjd32.exe145⤵PID:5596
-
C:\Windows\SysWOW64\Oefffaai.exeC:\Windows\system32\Oefffaai.exe146⤵PID:6172
-
C:\Windows\SysWOW64\Plpobk32.exeC:\Windows\system32\Plpobk32.exe147⤵PID:6216
-
C:\Windows\SysWOW64\Pookof32.exeC:\Windows\system32\Pookof32.exe148⤵PID:6260
-
C:\Windows\SysWOW64\Pjdologp.exeC:\Windows\system32\Pjdologp.exe149⤵PID:6304
-
C:\Windows\SysWOW64\Plehnjdq.exeC:\Windows\system32\Plehnjdq.exe150⤵PID:6348
-
C:\Windows\SysWOW64\Pcopjdlm.exeC:\Windows\system32\Pcopjdlm.exe151⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6392 -
C:\Windows\SysWOW64\Plgdcj32.exeC:\Windows\system32\Plgdcj32.exe152⤵PID:6436
-
C:\Windows\SysWOW64\Pfpilpio.exeC:\Windows\system32\Pfpilpio.exe153⤵PID:6480
-
C:\Windows\SysWOW64\Pohnee32.exeC:\Windows\system32\Pohnee32.exe154⤵PID:6524
-
C:\Windows\SysWOW64\Pgoefbpa.exeC:\Windows\system32\Pgoefbpa.exe155⤵PID:6564
-
C:\Windows\SysWOW64\Qjnbbnoe.exeC:\Windows\system32\Qjnbbnoe.exe156⤵
- System Location Discovery: System Language Discovery
PID:6604 -
C:\Windows\SysWOW64\Qllnnini.exeC:\Windows\system32\Qllnnini.exe157⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:6648 -
C:\Windows\SysWOW64\Qojjjenl.exeC:\Windows\system32\Qojjjenl.exe158⤵PID:6692
-
C:\Windows\SysWOW64\Qcffkc32.exeC:\Windows\system32\Qcffkc32.exe159⤵PID:6736
-
C:\Windows\SysWOW64\Qgablbno.exeC:\Windows\system32\Qgablbno.exe160⤵PID:6780
-
C:\Windows\SysWOW64\Qfdbgo32.exeC:\Windows\system32\Qfdbgo32.exe161⤵PID:6824
-
C:\Windows\SysWOW64\Qhbocj32.exeC:\Windows\system32\Qhbocj32.exe162⤵PID:6868
-
C:\Windows\SysWOW64\Qlnkdilf.exeC:\Windows\system32\Qlnkdilf.exe163⤵PID:6912
-
C:\Windows\SysWOW64\Qqjgdh32.exeC:\Windows\system32\Qqjgdh32.exe164⤵PID:6956
-
C:\Windows\SysWOW64\Qchcqc32.exeC:\Windows\system32\Qchcqc32.exe165⤵PID:7000
-
C:\Windows\SysWOW64\Agdoaall.exeC:\Windows\system32\Agdoaall.exe166⤵PID:7044
-
C:\Windows\SysWOW64\Amqgii32.exeC:\Windows\system32\Amqgii32.exe167⤵PID:7088
-
C:\Windows\SysWOW64\Aooced32.exeC:\Windows\system32\Aooced32.exe168⤵PID:7132
-
C:\Windows\SysWOW64\Agflga32.exeC:\Windows\system32\Agflga32.exe169⤵PID:5352
-
C:\Windows\SysWOW64\Amcdoh32.exeC:\Windows\system32\Amcdoh32.exe170⤵PID:6200
-
C:\Windows\SysWOW64\Acmllbpm.exeC:\Windows\system32\Acmllbpm.exe171⤵PID:6268
-
C:\Windows\SysWOW64\Ajgdhm32.exeC:\Windows\system32\Ajgdhm32.exe172⤵PID:6340
-
C:\Windows\SysWOW64\Aqamef32.exeC:\Windows\system32\Aqamef32.exe173⤵PID:6408
-
C:\Windows\SysWOW64\Agkebqfd.exeC:\Windows\system32\Agkebqfd.exe174⤵PID:6476
-
C:\Windows\SysWOW64\Ailaii32.exeC:\Windows\system32\Ailaii32.exe175⤵PID:6572
-
C:\Windows\SysWOW64\Aofjfcco.exeC:\Windows\system32\Aofjfcco.exe176⤵
- System Location Discovery: System Language Discovery
PID:6624 -
C:\Windows\SysWOW64\Acafga32.exeC:\Windows\system32\Acafga32.exe177⤵
- System Location Discovery: System Language Discovery
PID:6672 -
C:\Windows\SysWOW64\Aqefpfkb.exeC:\Windows\system32\Aqefpfkb.exe178⤵PID:6764
-
C:\Windows\SysWOW64\Aohflb32.exeC:\Windows\system32\Aohflb32.exe179⤵PID:6836
-
C:\Windows\SysWOW64\Bfbohmii.exeC:\Windows\system32\Bfbohmii.exe180⤵PID:6892
-
C:\Windows\SysWOW64\Bqhcfeho.exeC:\Windows\system32\Bqhcfeho.exe181⤵PID:6964
-
C:\Windows\SysWOW64\Bokcab32.exeC:\Windows\system32\Bokcab32.exe182⤵PID:7028
-
C:\Windows\SysWOW64\Bfeknmgf.exeC:\Windows\system32\Bfeknmgf.exe183⤵PID:7100
-
C:\Windows\SysWOW64\Bqjpke32.exeC:\Windows\system32\Bqjpke32.exe184⤵
- System Location Discovery: System Language Discovery
PID:5244 -
C:\Windows\SysWOW64\Bjbddkmm.exeC:\Windows\system32\Bjbddkmm.exe185⤵PID:6224
-
C:\Windows\SysWOW64\Bmaqpflq.exeC:\Windows\system32\Bmaqpflq.exe186⤵PID:6316
-
C:\Windows\SysWOW64\Bqmlae32.exeC:\Windows\system32\Bqmlae32.exe187⤵PID:6492
-
C:\Windows\SysWOW64\Bfieil32.exeC:\Windows\system32\Bfieil32.exe188⤵
- Modifies registry class
PID:6644 -
C:\Windows\SysWOW64\Bmcmffjn.exeC:\Windows\system32\Bmcmffjn.exe189⤵PID:6744
-
C:\Windows\SysWOW64\Bpaibaia.exeC:\Windows\system32\Bpaibaia.exe190⤵PID:6856
-
C:\Windows\SysWOW64\Bijnkgpb.exeC:\Windows\system32\Bijnkgpb.exe191⤵PID:5572
-
C:\Windows\SysWOW64\Cmhfae32.exeC:\Windows\system32\Cmhfae32.exe192⤵PID:7096
-
C:\Windows\SysWOW64\Cpfcmq32.exeC:\Windows\system32\Cpfcmq32.exe193⤵PID:7144
-
C:\Windows\SysWOW64\Cfpkjk32.exeC:\Windows\system32\Cfpkjk32.exe194⤵PID:6344
-
C:\Windows\SysWOW64\Cafogc32.exeC:\Windows\system32\Cafogc32.exe195⤵
- System Location Discovery: System Language Discovery
PID:6616 -
C:\Windows\SysWOW64\Cpipbpcj.exeC:\Windows\system32\Cpipbpcj.exe196⤵
- System Location Discovery: System Language Discovery
PID:6772 -
C:\Windows\SysWOW64\Cmmpldbc.exeC:\Windows\system32\Cmmpldbc.exe197⤵PID:6908
-
C:\Windows\SysWOW64\Cahlmc32.exeC:\Windows\system32\Cahlmc32.exe198⤵PID:7052
-
C:\Windows\SysWOW64\Cmomad32.exeC:\Windows\system32\Cmomad32.exe199⤵PID:6292
-
C:\Windows\SysWOW64\Cfgajjfa.exeC:\Windows\system32\Cfgajjfa.exe200⤵
- Drops file in System32 directory
- Modifies registry class
PID:6552 -
C:\Windows\SysWOW64\Cmaigd32.exeC:\Windows\system32\Cmaigd32.exe201⤵PID:4372
-
C:\Windows\SysWOW64\Dmdfmclk.exeC:\Windows\system32\Dmdfmclk.exe202⤵
- System Location Discovery: System Language Discovery
PID:4460 -
C:\Windows\SysWOW64\Daaocb32.exeC:\Windows\system32\Daaocb32.exe203⤵PID:6884
-
C:\Windows\SysWOW64\Djjclgib.exeC:\Windows\system32\Djjclgib.exe204⤵PID:7124
-
C:\Windows\SysWOW64\Diopmdnj.exeC:\Windows\system32\Diopmdnj.exe205⤵PID:6468
-
C:\Windows\SysWOW64\Dmklmb32.exeC:\Windows\system32\Dmklmb32.exe206⤵PID:4292
-
C:\Windows\SysWOW64\Dpihin32.exeC:\Windows\system32\Dpihin32.exe207⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:376 -
C:\Windows\SysWOW64\Dfcqfhld.exeC:\Windows\system32\Dfcqfhld.exe208⤵PID:7016
-
C:\Windows\SysWOW64\Dmmicbdq.exeC:\Windows\system32\Dmmicbdq.exe209⤵PID:6812
-
C:\Windows\SysWOW64\Ejailfbj.exeC:\Windows\system32\Ejailfbj.exe210⤵PID:6952
-
C:\Windows\SysWOW64\Edinel32.exeC:\Windows\system32\Edinel32.exe211⤵
- Drops file in System32 directory
- Modifies registry class
PID:6756 -
C:\Windows\SysWOW64\Efhjag32.exeC:\Windows\system32\Efhjag32.exe212⤵PID:6356
-
C:\Windows\SysWOW64\Eppojm32.exeC:\Windows\system32\Eppojm32.exe213⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:3360 -
C:\Windows\SysWOW64\Ejfcgf32.exeC:\Windows\system32\Ejfcgf32.exe214⤵PID:7180
-
C:\Windows\SysWOW64\Eapkdpfb.exeC:\Windows\system32\Eapkdpfb.exe215⤵PID:7224
-
C:\Windows\SysWOW64\Epbkpm32.exeC:\Windows\system32\Epbkpm32.exe216⤵PID:7268
-
C:\Windows\SysWOW64\Ehjcaj32.exeC:\Windows\system32\Ehjcaj32.exe217⤵PID:7308
-
C:\Windows\SysWOW64\Ejhpme32.exeC:\Windows\system32\Ejhpme32.exe218⤵PID:7352
-
C:\Windows\SysWOW64\Emflia32.exeC:\Windows\system32\Emflia32.exe219⤵PID:7396
-
C:\Windows\SysWOW64\Edqdfk32.exeC:\Windows\system32\Edqdfk32.exe220⤵
- Drops file in System32 directory
PID:7440 -
C:\Windows\SysWOW64\Ehlpfjkl.exeC:\Windows\system32\Ehlpfjkl.exe221⤵PID:7484
-
C:\Windows\SysWOW64\Eimlnb32.exeC:\Windows\system32\Eimlnb32.exe222⤵PID:7528
-
C:\Windows\SysWOW64\Faddoo32.exeC:\Windows\system32\Faddoo32.exe223⤵PID:7564
-
C:\Windows\SysWOW64\Fhnmliii.exeC:\Windows\system32\Fhnmliii.exe224⤵PID:7616
-
C:\Windows\SysWOW64\Fkmihehm.exeC:\Windows\system32\Fkmihehm.exe225⤵
- Modifies registry class
PID:7652 -
C:\Windows\SysWOW64\Fipica32.exeC:\Windows\system32\Fipica32.exe226⤵PID:7704
-
C:\Windows\SysWOW64\Fdemajom.exeC:\Windows\system32\Fdemajom.exe227⤵
- Modifies registry class
PID:7748 -
C:\Windows\SysWOW64\Fgcjmfna.exeC:\Windows\system32\Fgcjmfna.exe228⤵
- Modifies registry class
PID:7792 -
C:\Windows\SysWOW64\Fmnbjp32.exeC:\Windows\system32\Fmnbjp32.exe229⤵PID:7836
-
C:\Windows\SysWOW64\Fplnfk32.exeC:\Windows\system32\Fplnfk32.exe230⤵
- Drops file in System32 directory
PID:7880 -
C:\Windows\SysWOW64\Fhcfgi32.exeC:\Windows\system32\Fhcfgi32.exe231⤵PID:7924
-
C:\Windows\SysWOW64\Fkabcd32.exeC:\Windows\system32\Fkabcd32.exe232⤵PID:7968
-
C:\Windows\SysWOW64\Fakkpnld.exeC:\Windows\system32\Fakkpnld.exe233⤵
- Drops file in System32 directory
PID:8012 -
C:\Windows\SysWOW64\Fdjgljkh.exeC:\Windows\system32\Fdjgljkh.exe234⤵PID:8056
-
C:\Windows\SysWOW64\Fkdoidbe.exeC:\Windows\system32\Fkdoidbe.exe235⤵
- Adds autorun key to be loaded by Explorer.exe on startup
PID:8100 -
C:\Windows\SysWOW64\Fmbkeoai.exeC:\Windows\system32\Fmbkeoai.exe236⤵
- Drops file in System32 directory
PID:8140 -
C:\Windows\SysWOW64\Fpqgakql.exeC:\Windows\system32\Fpqgakql.exe237⤵PID:8184
-
C:\Windows\SysWOW64\Fdlcai32.exeC:\Windows\system32\Fdlcai32.exe238⤵PID:7216
-
C:\Windows\SysWOW64\Fgkpne32.exeC:\Windows\system32\Fgkpne32.exe239⤵PID:7288
-
C:\Windows\SysWOW64\Giiljp32.exeC:\Windows\system32\Giiljp32.exe240⤵PID:7360
-
C:\Windows\SysWOW64\Gpcdfjoj.exeC:\Windows\system32\Gpcdfjoj.exe241⤵PID:7428
-
C:\Windows\SysWOW64\Ghjlhhol.exeC:\Windows\system32\Ghjlhhol.exe242⤵PID:7492